Developing a Secure COTS-Based Trusted Computing System
System-level security is more than simply the sum of its parts. Read about key protections that must be considered when developing a secure COTS-based Trusted Computing system.
Read the white paper by Curtiss-Wright TCOTS experts and learn about our holistic approach to Trusted Computing that applies rigorous protection standards at every stage of the development process.
Hardware Features for Maintaining Security During Operation
This white paper focuses on hardware features built-in to the most popular defense and aerospace processor architectures to ensure the continued security of a trusted system during operation.
This white paper looks at Trusted Boot, a key strategy for ensuring that the trustworthiness of an embedded system begins with the very first software instruction at system startup in order to protect against attacks.
This white paper looks at the use of open standards-based commercial-off-the-shelf (COTS) technologies to address Trusted Computing requirements in deployable embedded systems for aerospace and defense applications.
Defense and aerospace systems may be exposed to many security threats before, during, and after deployment. As a result, every system needs the right level of protection to ensure that it cannot be hacked or expose sensitive information.
The Root of Trust: A Foundation for Trusted Computing
Steve Edwards looks at the growing demand for trusted computing solutions with effective protections against cyberattacks in the global defense electronics market.
Data Protection with the NXP QorIQ Platform Trust Architecture
This white paper presents an overview of the potential threats to an embedded system, and how the Trust Architecture can effectively defend against these threats.